A Declarative Approach for the study of Security Protocols. Hugo Andrés López A. Grupo de Investigación AVISPA Pontificia Universidad Javeriana
Seguridad en la Computación La computación se sustenta actualmente por paradigmas de computo y almacenamiento distribuidos. El desarrollo de las redes de comunicación, en particular internet y las redes inalámbricas presupone mayores riesgos que la información se mantenga disponible.
Process Calculi for Security Protocols
Constraint – Based Process Calculus for Security Protocols (SPL)
Needham-Schroeder Protocol: Example for Authentication
Network Attackers.
Theoretical models of Security Networks
Case Study: P2P systems
Current Results
Thesis Possibilities Two main trends of research: Implementation of Real-World Protocols. Construction of Logical Approaches using Concurrent Constraint Programming (CCP). Other Suggestions? The possibilities are endless.
!!Thank You!!